Friday, December 6, 2019

Entrepreneurship Theory and Research †Free Samples to Students

Question: Discuss about the Entrepreneurship Theory and Research. Answer: Introduction: The main purpose of the development of the network solution for the biomedical development company is to accommodate the future growth of the organization management and increase the efficiency of the current network infrastructure. The current network infrastructure of the organization is outdated and new technologies are required to be applied for supporting the new devices connected in the network and increase the security of the network. The security of the network is required to be strong as remote logging is required to be enabled in the network for accessing the network resources. A new network solution is required to be implemented and the recent technologies can be used such that the network can serve the needs of the organization for the upcoming five years. The network is required to be modern an support videoconferencing, WLAN, etc. Business Goals: To increase the productivity of the employees and more computers and virtual machines are required to be installed The network is required to be configured with remote accessibility such that the employees can access the network from remote location The security of the network is required to be strong that the unauthroised personnel cannot have the access of the network. To increase the data transmission speed and avoid congestion in the network during the peak hours Technical Goals: To configure the router with ACL and access control list and add authorization to the PCs and users to access the particular network component management. To configure the firewall to block unknown request and secure the network To secure the wireless access point with the application of encryption algorithm To make the network always available for the user. Various community of Users and their level of priority The main user of the network are the software developers, web designers and the business employees. The software programmer and the web designer works on the first building and the second building consists of the business employees and the technical department. The user of the current network framework can be categorized into different types such as: Heavy Users and Moderate Users. Heavy users- this type of users are the software and the web development team and they uses hungry application generating a huge number of request and data in the network. A separate VLAN is required to be allocated to this users such that network congestion is avoided. This users needs printing frequently and can cause congestion in the network. Moderate Users- This type of users uses moderate applications and have minimum printing request and thus more number of users can be allocated to the VLAN created for the moderate users. Remote Access Requirement A VPN connection is required to be created for connecting the remote users with the organizational network and increasing the efficiency of the current framework of the organization. The VPN is required to be connected using a firewall and business rules are used for configuring the firewall and block unauthroised access. The employees needs mobility support for the network and connect their own devices using the wireless access point installed in the network. Using the wireless network of the organization the employees can transfer different files and reduce the software development time. The network is developed with a less response time and proper cabling plan is required to be used for supporting large amount of transmission. Cisco 1941 series routers are used and there is no wireless access point installed in the network for connecting the smartphones or tablets in the network. The first building consists of the software developer and the web designer and a huge amount of traffic is generated from the building and thus there is a requirement of developing the network to reduce congestion and handle the request of the user efficiently. Layer 2 switches are used for connecting the devices and Ethernet cable of 1000Bt are used that have UTP gigabyte support. Cat 6 cables are used for connecting the network resources and act as the backbone connection of the network and support larger bandwidth for increasing the efficiency and reduce the collision of the data packets. The heavy users uses machines with high end support for applications and faster processor with multiple cores. Different community of user uses different hardware setup for coding, designing or processing. Thus for the development of the network proper hardware device is required to be selected. The standard users uses a machine of medium processing capability, larger memory and high resolution support. Analysis of the existing network A logical and a physical network diagram is created for the network and it is required to be configured with appropriate networking protocols for handling the request from the users. The existing is required to be improved for the accommodation of the more number of nodes and workstation in the office. The existing solution uses a Hub for transferring of the data packets and it is required to be replaced with switches and routers for increasing the efficiency of the solution. The existing network have lots of scope of improvement, there is a requirement of implementation of the wireless access point on the current network framework for the improvement of the system. Conclusions The wireless access point installed in the network are secured and WPA/ PSK2 is applied for securing the wireless access point and prevent unauthroised personnel to use the network. A huge number of request is required to be handled by the proposed network solution and the wireless access point is required to be secured with strong encryption algorithm for increasing the security of the proposed solution. The network backbone is required to be changed from cat 6 to fiber optics such that a huge number of request and data packets can be transferred in the network. The VPN tunneling is also used for providing remote connectivity of the employees and it is connected via a firewall for increasing the security of the proposed network solution. Thus the report is prepared for creating a proposal for the new network solution and resolve the issue of compatibility of the hardware connected in the network. Bibliography Freeman, R.L., 2015.Telecommunication system engineering(Vol. 82). John Wiley Sons. Kripalani, S.H., Commvault Systems, Inc., 2015.Automatic identification of storage requirements, such as for use in selling data storage management solutions. U.S. Patent 9,021,452. Lazzeroni, J.J., Carevich, M.K., Vertz, J.D., Hauser, P.E.H. and Kingston, S.J., 2016.Simultaneous voice and audio traffic between two devices on a wireless personal-area network. U.S. Patent 9,398,620. Mazalan, L., Hamdan, S.S.S., Masudi, N., Hashim, H., Rahman, R.A., Tahir, N.M., Zaini, N.M., Rosli, R. and Omar, H.A., 2013, November. Throughput analysis of LAN and WAN network based on socket buffer length using JPerf. InControl System, Computing and Engineering (ICCSCE), 2013 IEEE International Conference on(pp. 621-625). IEEE. Nadji, Y., Dagon, D., Antonakakis, M. and Joffe, R., 2016, September. Enabling Network Security Through Active DNS Datasets. InResearch in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings(Vol. 9854, p. 188). Springer. Partanen, J., Chetty, S.K. and Rajala, A., 2014. Innovation types and network relationships.Entrepreneurship Theory and Practice,38(5), pp.1027-1055. Rogasch, N.C. and Fitzgerald, P.B., 2013. Assessing cortical network properties using TMSEEG.Human brain mapping,34(7), pp.1652-1669. Roka, R., 2012.Fixed transmission media. INTECH Open Access Publisher. Tang, Q.Y. and Zhang, C.X., 2013. Data Processing System (DPS) software with experimental design, statistical analysis and data mining developed for use in entomological research.Insect Science,20(2), pp.254-260. Thaler, D., Draves, R., Matsumoto, A. and Chown, T., 2012.Default address selection for internet protocol version 6 (IPv6)(No. RFC 6724). Willars, P., Telefonaktiebolaget LM Ericsson (Publ), 2012.Priority bearers in a mobile telecommunication network. U.S. Patent 8,300,575. Yang, X., Zhou, M. and Cao, J., 2013, April. Synchronization in array of coupled neural networks with unbounded distributed delay and limited transmission efficiency. InAbstract and Applied Analysis(Vol. 2013). Hindawi Publishing Corporation.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.